Patents by Inventor Collin Greene
Collin Greene has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240106158Abstract: Connector receptacles and connector receptacle interfaces that can detect a connection to a corresponding connector insert, can detect liquid in the connector receptacle, and can limit damage to the connector receptacle caused by the liquid.Type: ApplicationFiled: September 11, 2023Publication date: March 28, 2024Applicant: Apple Inc.Inventors: Eric B. Wankoff, Peter J. Cameron, Mahmoud R. Amini, Daren L. Rimando, Sotirios Lyrintzis, Makiko K. Brzezinski, Adam H. Herzog, Mohammed Nasser Khamis Al Jashmi, George Tziviskos, Aaron N. Miletich, Collin Greene, Jason S. Sloey, Sydney Puckett
-
Patent number: 9507940Abstract: A system and method for adapting a security tool for performing security analysis on a software application. In one embodiment, a method includes maintaining a registry of security tools; receiving code for a software application; and comparing component criteria for each security tool against each component of the software application, wherein the component criteria for each respective security tool indicate which components the respective security tool is designed to analyze for security vulnerabilities. The method also includes generating a tool-specific package for each component of the software application, wherein the tool-specific package comprises one or more security tools that are designed to analyze the respective component for security vulnerabilities.Type: GrantFiled: August 10, 2010Date of Patent: November 29, 2016Assignee: salesforce.com, inc.Inventors: Collin Greene, Robert Fly
-
Publication number: 20140259164Abstract: Disclosed are systems, apparatus, methods, and computer readable media for determining a confidentiality for a site record. In one embodiment, a site record for analysis is identified at a computing device. The computing device may identify a source for the site record and determine, based on the source, a source-based confidentiality for the site record. The computing device may identify, based on the site record, a designated confidentiality for the site record, and determine that the designated confidentiality is different from the source-based confidentiality. Responsive to the determination that the designated confidentiality is different from the source-based confidentiality, the computing device may store the source-based confidentiality for the site record on a storage medium.Type: ApplicationFiled: May 22, 2014Publication date: September 11, 2014Applicant: salesforce.com, inc.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Patent number: 8768964Abstract: Disclosed are systems, apparatus, methods, and computer readable media for analyzing computing site information. In one embodiment, an analysis tool for analyzing a first site record stored on a storage medium may be selected. The first site record comprising information may relate to a computing site. The computing site may comprise a unit of computing functionality accessible via a network. When it is determined that first confidentiality level for the computing site exceeds a trust level for the analysis tool, the first site record may be modified to create a second site record, the second site record having a second confidentiality level, the second confidentiality level not exceeding the trust level.Type: GrantFiled: March 14, 2011Date of Patent: July 1, 2014Assignee: salesforce.com, inc.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Patent number: 8701198Abstract: A system and method for performing security analysis on a software application. In one embodiment, a method includes receiving application architecture information for a software application; and determining an application type based on the application architecture information. The method also includes performing one or more security tests on the software application based on the application type and the application architecture information; and approving the software application to be available in an online marketplace if the software application passes the one or more security tests.Type: GrantFiled: August 10, 2010Date of Patent: April 15, 2014Assignee: salesforce.com, inc.Inventors: Collin Greene, Robert Fly, Varun Badhwar
-
Patent number: 8516591Abstract: Disclosed are systems, apparatus, methods, and computer readable media for determining a combined trust level for a website. In one embodiment, a user account associated with the creation or maintenance of the website may be analyzed. The analysis of the user account may be capable of identifying the presence or absence of a first risk factor affecting a likelihood that the user account is engaged in a malicious activity. A source code file capable of being used to create a message for sending to a remote computing device may be analyzed. The analysis of the source code file may be capable of identifying the presence or absence of a second risk factor affecting a likelihood that the source code file is facilitating a malicious activity. Based on the analysis, a combined trust level for the website may be determined.Type: GrantFiled: March 14, 2011Date of Patent: August 20, 2013Assignee: salesforce.com, inc.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Publication number: 20120042383Abstract: A system and method for adapting a security tool for performing security analysis on a software application. In one embodiment, a method includes maintaining a registry of security tools; receiving code for a software application; and comparing component criteria for each security tool against each component of the software application, wherein the component criteria for each respective security tool indicate which components the respective security tool is designed to analyze for security vulnerabilities. The method also includes generating a tool-specific package for each component of the software application, wherein the tool-specific package comprises one or more security tools that are designed to analyze the respective component for security vulnerabilities.Type: ApplicationFiled: August 10, 2010Publication date: February 16, 2012Applicant: Salesforce.com, Inc.Inventors: Collin Greene, Robert Fly
-
Publication number: 20120042384Abstract: A system and method for performing security analysis on a software application. In one embodiment, a method includes receiving application architecture information for a software application; and determining an application type based on the application architecture information. The method also includes performing one or more security tests on the software application based on the application type and the application architecture information; and approving the software application to be available in an online marketplace if the software application passes the one or more security tests.Type: ApplicationFiled: August 10, 2010Publication date: February 16, 2012Applicant: Salesforce.com, inc.Inventors: Varun Badhwar, Collin Greene, Robert Fly
-
Publication number: 20110307452Abstract: A system and method for performing code analysis in a database system. In one embodiment, a method includes receiving a request to scan code for a software application. The method further includes fetching metadata associated with a user, fetching the code for the software application, and scanning the code.Type: ApplicationFiled: December 23, 2010Publication date: December 15, 2011Applicant: Salesforce.com, inc.Inventors: Robert Fly, Collin Greene, Brendan O'Connor, Brian Soby
-
Publication number: 20110282908Abstract: Disclosed are systems, apparatus, methods, and computer readable media for analyzing computing site information. In one embodiment, an analysis tool for analyzing a first site record stored on a storage medium may be selected. The first site record comprising information may relate to a computing site. The computing site may comprise a unit of computing functionality accessible via a network. When it is determined that first confidentiality level for the computing site exceeds a trust level for the analysis tool, the first site record may be modified to create a second site record, the second site record having a second confidentiality level, the second confidentiality level not exceeding the trust level.Type: ApplicationFiled: March 14, 2011Publication date: November 17, 2011Applicant: SALESFORCE.COM, INC.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph
-
Publication number: 20110283356Abstract: Disclosed are systems, apparatus, methods, and computer readable media for determining a combined trust level for a website. In one embodiment, a user account associated with the creation or maintenance of the website may be analyzed. The analysis of the user account may be capable of identifying the presence or absence of a first risk factor affecting a likelihood that the user account is engaged in a malicious activity. A source code file capable of being used to create a message for sending to a remote computing device may be analyzed. The analysis of the source code file may be capable of identifying the presence or absence of a second risk factor affecting a likelihood that the source code file is facilitating a malicious activity. Based on the analysis, a combined trust level for the website may be determined.Type: ApplicationFiled: March 14, 2011Publication date: November 17, 2011Applicant: SALESFORCE.COM, INC.Inventors: Robert Fly, Collin Greene, Brian Soby, James Dolph